An extended chaotic maps-based key agreement protocol with user anonymity

Cheng Chi Lee*, Chin Ling Chen, Chia Ying Wu, Shiow Yuan Huang

*Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

93 Scopus citations

Abstract

A key agreement protocol is used to derive a shared secure session key by two or more parties, but no party can predetermine the resulting value. Users can securely exchange information over an open network by using the shared session key to encrypt/decrypt secure information. Recently, several key agreement protocols based on chaotic maps are proposed. Xiao et al. proposed a novel key agreement protocol based on chaotic maps and claimed their protocol can resist the known attack which is proposed by Bergamo et al. However, Han et al. and Xiang et al. pointed out that the Xiao et al. protocol is still insecure. To overcome these attacks, we shall propose an extended chaotic maps-based key agreement protocol. The proposed protocol not only can resist these attacks, but also provide mutual authentication and user anonymity.

Original languageEnglish
Pages (from-to)79-87
Number of pages9
JournalNonlinear Dynamics
Volume69
Issue number1-2
DOIs
StatePublished - 07 2012
Externally publishedYes

Keywords

  • Anonymity
  • Chaotic maps
  • Key agreement protocol
  • Mutual authentication

Fingerprint

Dive into the research topics of 'An extended chaotic maps-based key agreement protocol with user anonymity'. Together they form a unique fingerprint.

Cite this